Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Group Message Authentication Protocol for LTE-based V2X Communications

Correspondence Dongxiao Liu, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo Canada N2L 3G1 Email: [email protected] Cellular technologies, in particular the current long-term evolution (LTE) and future 5G, are suitable for implementing vehicle-to-everything (V2X) services, due to the existing network infrastructure, device-to-device (D2D) communicati...

متن کامل

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol

We propose a privacy preserving biometrics-based authentication protocol by which users can authenticate to different service providers from their own devices without involving identity providers in the transactions. Authentication is performed through a zero-knowledge proof of knowledge protocol which is based on a cryptographic identity token created using the unique, repeatable and revocable...

متن کامل

A Privacy-Preserving Biometric Authentication Protocol Revisited

Biometric authentication establishes the identity of an individual based on biometric templates (i.e. fingerprints, retina scans etc.). Although biometric authentication has important advantages and many applications, it also raises serious security and privacy concerns. In this parer, we investigate a privacy-preserving biometric authentication protocol that has been proposed by Bringer et al....

متن کامل

Cryptanalysis of a Deniable Authentication Protocol based on Bilinear Pairing using Single Sender and Group Sender

The aim of an efficient deniable authentication protocol is to enable a receiver to identify the source of a given message but not to prove the identity of the sender. Lu and Cao [7,10] confirmed that the previous protocols had a common weakness in which any third party can impersonate the intended receiver to verify the signature of the given message, and they proposed a new protocol based on ...

متن کامل

Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol

We enroll more and more personal pervasive devices because these simplify our everyday lives. In order to verify the identity of these devices we use authentication protocols. Although simple authentication often suffices, users would like to remain anonymous during these authentications. Many privacy-preserving authentication protocols have been proposed that claim security and privacy. Howeve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2021

ISSN: 1424-8220

DOI: 10.3390/s21020665